Question
a.
The administrator enjoys more control on the grant option.
b.
It is difficult to differentiate among the update, delete and insert authorizations.
c.
Cannot store more than one relation in a file.
d.
Operations on the database are speeded up as the authorization procedure is carried out at the operating system level.
Posted under UGC NET computer science question paper DBMS
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Database systems that store each relation in a separate operating system file may use the operating system’s authorization scheme, instead of defining a special scheme themselves....
Similar Questions
Discover Related MCQs
Q. Let R1(a, b, c) and R2(x, y, z) be two relations in which a is the foreign key of R1 that refers to the primary key of R2. Consider following four options.
(a) Insert into R1 (b) Insert into R2
(c) Delete from R1 (d) Delete from R2
Which of the following is correct about the referential integrity constraint with respect to above?
View solution
Q. Consider a hash table of size seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Here “__” denotes an empty location in the table.
View solution
Q. Which of the following is/are true with reference to 'view' in DBMS?
(a) A 'view' is a special stored procedure executed when certain event occurs.
(b) A 'view' is a virtual table, which occurs after executing a pre-compiled query.
View solution
Q. In SQL, .................. is an Aggregate function.
View solution
Q. Match the following with respect to RDBMS:
List - I
(a) Entity integrity
(b) Domain integrity
(c) Referential integrity
(d) Userdefined integrity
List - II
(i) enforces some specific business rule that do not fall into entity or domain
(ii) Rows can't be deleted which are used by other records
(iii) enforces valid entries for a column
(iv) No duplicate rows in a table
Code:
(a) (b) (c) (d)
View solution
Q. In RDBMS, different classes of relations are created using ................... technique to prevent modification anomalies.
View solution
Q. .................. SQL command changes one or more fields in a record.
View solution
Q. If every non-key attribute is functionally dependent on the primary key, then the relation is in ....................
View solution
Q. Consider a relation R (A, B, C, D, E, F, G, H), where each attribute is atomic, and following functional dependencies exist.
CH → G
A → BC
B → CFH
E → A
F → EG
The relation R is ....................
View solution
Q. Given two relations R1(A, B) and R2(C, D), the result of following query
Select distinct A, B from R1, R2
is guaranteed to be same as R1 provided one of the following condition is satisfied.
View solution
Q. Consider a schema R(A, B, C, D) and following functional dependencies.
A → B
B → C
C → D
D → B
Then decomposition of R into R1(A, B), R2(B, C) and R3(B, D) is ..................
View solution
Suggested Topics
Are you eager to expand your knowledge beyond DBMS? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!